Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2026-26342
PUBLISHED
More InfoOfficial Page
Assigner-VulnCheck
Assigner Org ID-83251b91-4cc7-4094-a5c7-464a1b83ea10
View Known Exploited Vulnerability (KEV) details
Published At-24 Feb, 2026 | 18:41
Updated At-24 Feb, 2026 | 18:41
Rejected At-
▼CVE Numbering Authority (CNA)
Tattile Smart+ / Vega / Basic <= 1.181.5 Insufficient Session Token Expiration

Tattile Smart+, Vega, and Basic device families firmware versions 1.181.5 and prior implement an authentication token (X-User-Token) with insufficient expiration. An attacker who obtains a valid token (for example via interception, log exposure, or token reuse on a shared system) can continue to authenticate to the management interface until the token is revoked, enabling unauthorized access to device functions and data.

Affected Products
Vendor
Tattile s.r.l.
Product
Smart+
Default Status
unaffected
Versions
Affected
  • From 0 through 1.181.5 (semver)
Vendor
Tattile s.r.l.
Product
Tolling+
Default Status
unaffected
Versions
Affected
  • From 0 through 1.181.5 (semver)
Vendor
Tattile s.r.l.
Product
Smart+ Speed
Default Status
unaffected
Versions
Affected
  • From 0 through 1.181.5 (semver)
Vendor
Tattile s.r.l.
Product
Smart+ Traffic Light
Default Status
unaffected
Versions
Affected
  • From 0 through 1.181.5 (semver)
Vendor
Tattile s.r.l.
Product
Axle Counter
Default Status
unaffected
Versions
Affected
  • From 0 through 1.181.5 (semver)
Vendor
Tattile s.r.l.
Product
Vega53
Default Status
unaffected
Versions
Affected
  • From 0 through 1.181.5 (semver)
Vendor
Tattile s.r.l.
Product
Vega33
Default Status
unaffected
Versions
Affected
  • From 0 through 1.181.5 (semver)
Vendor
Tattile s.r.l.
Product
Vega11
Default Status
unaffected
Versions
Affected
  • From 0 through 1.181.5 (semver)
Vendor
Tattile s.r.l.
Product
Basic MK2
Default Status
unaffected
Versions
Affected
  • From 0 through 1.181.5 (semver)
Vendor
Tattile s.r.l.
Product
ANPR Mobile
Default Status
unaffected
Versions
Affected
  • From 0 through 1.181.5 (semver)
Problem Types
TypeCWE IDDescription
CWECWE-613CWE-613 Insufficient Session Expiration
Type: CWE
CWE ID: CWE-613
Description: CWE-613 Insufficient Session Expiration
Metrics
VersionBase scoreBase severityVector
4.08.7HIGH
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
Version: 4.0
Base score: 8.7
Base severity: HIGH
Vector:
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

finder
Gjoko Krstic of Zero Science Lab
Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.zeroscience.mk/en/vulnerabilities/ZSL-2026-5976.php
technical-description
exploit
https://www.tattile.com/
product
https://www.vulncheck.com/advisories/tattile-smart-vega-basic-insufficient-session-token-expiration
third-party-advisory
Hyperlink: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2026-5976.php
Resource:
technical-description
exploit
Hyperlink: https://www.tattile.com/
Resource:
product
Hyperlink: https://www.vulncheck.com/advisories/tattile-smart-vega-basic-insufficient-session-token-expiration
Resource:
third-party-advisory
Details not found